• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite

Information Technology, Network Security & Cybersecurity Updates

Is a chief cybersecurity officer critical for the enterprise?

Is a chief cybersecurity officer critical for the enterprise?

Estimated reading time: 3 minutes

In 2015, the Government of India established a first of sorts – they created a chief cybersecurity officer position under the Prime Minister’s Office. Dr Gulshan Rai became the special secretary for cybersecurity and after serving four years in...
Read Blog
November 20, 2019

Information security is a business concern, not just an IT concern!

Information security is a business concern, not just an IT concern!

Estimated reading time: 2 minutes

The global research and advisory firm Gartner estimated that worldwide information security spending would exceed $124 billion in 2019. The reason for such spending in information security is justified when one looks at the consequences of ignoring the risk...
Read Blog
November 19, 2019

How can CISOs defend businesses from supply chain attacks?

How can CISOs defend businesses from supply chain attacks?

Estimated reading time: 3 minutes

A supply chain is an omnipresent and inseparable element in every business, irrespective of its size.  Hence, when it comes to cybersecurity specific to this aspect, simply protecting an enterprise’s periphery isn’t enough. Supply chains consist of people, logistics,...
Read Blog
November 18, 2019

Top five cybersecurity challenges for the CISO

Top five cybersecurity challenges for the CISO

Estimated reading time: 3 minutes

Thanks to increasing cyberthreats, the role of the Chief Information Security Officer (CISO) in an organization is only expanding. More and more CISOs are now part of senior leadership teams, reporting directly to the Chief Executive Officer. There is...
Read Blog
November 14, 2019

How much did cyberattacks cost organizations in 2018?

How much did cyberattacks cost organizations in 2018?

Estimated reading time: 3 minutes

In today’s day, it has become common knowledge that cyberattacks are dangerous for an organization. However, sometimes, people within the organization can differ on the exact impact of these threats. These differences can often blindside businesses on the total...
Read Blog
November 13, 2019

The past, present and future of cybersecurity

The past, present and future of cybersecurity

Estimated reading time: 3 minutes

The evolution of cybersecurity is both, fascinating and intriguing. Today’s cybersecurity professionals have immense responsibility and burden compared to yesteryears – they have to tackle with a wide range of cyberthreats such as malware, insider attacks & Distributed Denial...
Read Blog
November 12, 2019

BlueKeep Attacks seen in the wild!

Estimated reading time: 2 minutes

CVE-2019-0708, popularly known as BlueKeep, is a RDP pre-authentication vulnerability which allows attacker to compromise a vulnerable system without user’s interaction. This exploit is also wormable, meaning that it can spread to other vulnerable systems in a similar way...
Read Blog
November 8, 2019

The importance of cybersecurity for satellite communications

The importance of cybersecurity for satellite communications

Estimated reading time: 3 minutes

A  major part of human communications today is dependent on satellites. More so,  global navigation systems, military strategies, information collection, environment research, and even the internet are all dependent on the smooth functioning and continuous integration with these valuable...
Read Blog
November 8, 2019

The cybersecurity threats drones face and how to mitigate them

The cybersecurity threats drones face and how to mitigate them

Estimated reading time: 3 minutes

The global drone market is expected to rise to $43 billion in 2024, a huge rise from $14 billion in 2018. It is an indicator of the huge popularity surge in drones, technically known as unmanned aerial vehicles (UAVs)....
Read Blog
November 7, 2019

Dealing with cybersecurity threats in the age of autonomous vehicles

Dealing with cybersecurity threats in the age of autonomous vehicles

Estimated reading time: 3 minutes

In 2015, security researchers Charlie Miller and Chris Valasek remotely took control of a Jeep Cherokee vehicle as an experiment. By exploiting vulnerabilities in the vehicle’s Internet-connected entertainment and navigation systems, the two researchers activated the windshield wipers, turned...
Read Blog
November 6, 2019
← Previous 1 … 23 24 25 … 72 Next →
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (319) cyber security (30) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (106) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) IoT (10) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies